trademark
2c2kIhh
2c2kIhh
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
References<br />
[ABC+07] Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea<br />
Kissner, Zachary N. J. Peterson and Dawn Song. Provable data possession at untrusted<br />
stores. In Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, editors,<br />
ACM CCS 07: 14th Conference on Computer and Communications Security, pages<br />
598–609. ACM Press, October 2007.<br />
[AGT01] Aris Anagnostopoulos, Michael T. Goodrich and Roberto Tamassia. Persistent<br />
authenticated dictionaries and their applications. Information Security. 379-393.<br />
Springer Berlin Heidelberg, 2001.<br />
[AKS07] Onur Aciiçmez, Çetin Kaya Koç and Jean-Pierre Seifert. Predicting secret keys via<br />
branch prediction. In Masayuki Abe, editor, Topics in Cryptology – CT-RSA 2007, volume<br />
4377 of Lecture Notes in Computer Science, pages 225–242. Springer, February 2007.<br />
[BBS04] Dan Boneh, Xavier Boyen and Hovav Shacham. Short group signatures. In<br />
Matthew Franklin, editor, Advances in Cryptology – CRYPTO 2004, volume 3152 of Lecture<br />
Notes in Computer Science, pages 41–55. Springer, August 2004.<br />
[BF01] Dan Boneh and Matthew K. Franklin. Identity-based encryption from the Weil<br />
pairing. In Joe Kilian, editor, Advances in Cryptology – CRYPTO 2001, volume 2139 of<br />
Lecture Notes in Computer Science, pages 213–229. Springer, August 2001.<br />
[BGN05] Dan Boneh, Eu-Jin Goh, and Kobbi Nissim. Evaluating 2-DNF formulas on<br />
ciphertexts. In Joe Kilian, editor, TCC 2005: 2nd Theory of Cryptography Conference, volume<br />
3378 of Lecture Notes in Computer Science, pages 325–341. Springer, February 2005.<br />
[BS12] Nitish Balachandran and Sugata Sanyal. A review of techniques to mitigate sybil<br />
attacks. arXiv preprint arXiv: 1207.2617, 2012.<br />
[BSW07] John Bethencourt, Amit Sahai and Brent Waters. Ciphertext-policy attributebased<br />
encryption. In 2007 IEEE Symposium on Security and Privacy, pages 321–334.<br />
IEEE Computer Society Press, May 2007.<br />
[BW07] Dan Boneh and Brent Waters. Conjunctive, subset, and range queries on<br />
encrypted data. In Salil P. Vadhan, editor, TCC 2007: 4th Theory of Cryptography<br />
Conference, volume 4392 of Lecture Notes in Computer Science, pages 535–554.<br />
Springer, February 2007.<br />
[CJJ+13] David Cash, Stanislaw Jarecki, Charanjit S. Jutla, Hugo Krawczyk, Marcel-Catalin<br />
Rosu and Michael Steiner. Highly-scalable searchable symmetric encryption with<br />
support for Boolean queries. In Ran Canetti and Juan A. Garay, editors, CRYPTO (1),<br />
volume 8042 of Lecture Notes in Computer Science, pages 353–373. Springer, 2013.<br />
CLOUD SECURITY ALLIANCE Big Data Working Group Guidance<br />
© Copyright 2016, Cloud Security Alliance. All rights reserved.<br />
60